City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.90.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59658
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.90.48.			IN	A
;; AUTHORITY SECTION:
.			444	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:14:05 CST 2022
;; MSG SIZE  rcvd: 105
        Host 48.90.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 48.90.21.104.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 159.203.78.201 | attackspam | srv02 Mass scanning activity detected Target: 8088(omniorb) ..  | 
                    2020-10-12 06:52:17 | 
| 218.59.47.1 | attack | [N10.H2.VM2] Port Scanner Detected Blocked by UFW  | 
                    2020-10-12 06:49:06 | 
| 73.13.104.201 | attackbots | Oct 12 00:34:28 pve1 sshd[15311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.13.104.201 Oct 12 00:34:29 pve1 sshd[15311]: Failed password for invalid user kura from 73.13.104.201 port 26196 ssh2 ...  | 
                    2020-10-12 06:48:44 | 
| 5.62.143.204 | attackspam | Oct 11 07:10:57 ns381471 sshd[11788]: Failed password for root from 5.62.143.204 port 41004 ssh2  | 
                    2020-10-12 07:12:34 | 
| 67.216.193.100 | attack | SSH Bruteforce Attempt on Honeypot  | 
                    2020-10-12 06:58:22 | 
| 185.202.2.147 | attackspam | 185.202.2.147 - - \[11/Oct/2020:23:39:41 +0200\] "\x03\x00\x00/\*\xE0\x00\x00\x00\x00\x00Cookie: mstshash=Administr" 400 166 "-" "-" ...  | 
                    2020-10-12 07:09:16 | 
| 192.185.2.104 | attack | /old/wp-admin/  | 
                    2020-10-12 06:47:20 | 
| 123.23.183.76 | attackbotsspam | Icarus honeypot on github  | 
                    2020-10-12 07:02:49 | 
| 58.222.11.82 | attackspambots | Icarus honeypot on github  | 
                    2020-10-12 06:43:31 | 
| 163.172.154.178 | attackbotsspam | 2020-10-12T00:30:12+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)  | 
                    2020-10-12 07:08:18 | 
| 200.40.42.54 | attackbots | Oct 12 01:12:47 host2 sshd[2566047]: Invalid user yamagiwa from 200.40.42.54 port 58152 Oct 12 01:12:48 host2 sshd[2566047]: Failed password for invalid user yamagiwa from 200.40.42.54 port 58152 ssh2 Oct 12 01:12:47 host2 sshd[2566047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.40.42.54 Oct 12 01:12:47 host2 sshd[2566047]: Invalid user yamagiwa from 200.40.42.54 port 58152 Oct 12 01:12:48 host2 sshd[2566047]: Failed password for invalid user yamagiwa from 200.40.42.54 port 58152 ssh2 ...  | 
                    2020-10-12 07:15:46 | 
| 116.196.120.254 | attackbots | Oct 11 23:53:36 gospond sshd[5706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.120.254 Oct 11 23:53:36 gospond sshd[5706]: Invalid user jenna from 116.196.120.254 port 56498 Oct 11 23:53:38 gospond sshd[5706]: Failed password for invalid user jenna from 116.196.120.254 port 56498 ssh2 ...  | 
                    2020-10-12 07:13:44 | 
| 129.208.199.139 | attack | 20/10/10@16:46:53: FAIL: Alarm-Network address from=129.208.199.139 20/10/10@16:46:53: FAIL: Alarm-Network address from=129.208.199.139 ...  | 
                    2020-10-12 07:03:18 | 
| 51.178.183.213 | attackspambots | Oct 11 14:13:19 NPSTNNYC01T sshd[13520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.183.213 Oct 11 14:13:21 NPSTNNYC01T sshd[13520]: Failed password for invalid user chris from 51.178.183.213 port 55728 ssh2 Oct 11 14:19:50 NPSTNNYC01T sshd[14112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.183.213 ...  | 
                    2020-10-12 06:53:51 | 
| 103.45.130.165 | attack | bruteforce detected  | 
                    2020-10-12 07:10:46 |